Bitdefender recently announced GravityZone Security for Containers, expanding our cloud workload security (CWS) by offering run-time support for containers and infrastructures with Linux kernel module (LKM) independence for the Bitdefender technology.
All about Virtualization and Cloud Security | Recent Articles:
Cyber security for small and mid-sized businesses (SMBs) is a particularly daunting challenge. These companies face many of the same cyber security threats that the largest global enterprises deal with—but often with a fraction of the resources. Aside from the obvious disadvantages smaller organizations face, there are also a number of misconceptions about security that can get in the way of better protection.
Named by many as the “cyber-attack of the year,” the recent Colonial Pipeline ransomware incident caused more than just business disruption - it inflicted considerable economical damage, reminding us how fragile our digital infrastructure is.
The use of containers to increase speed of deployment and portability for modern applications is growing rapidly. Now part of the standard architecture for cloud-native businesses, Gartner predicts that, by 2025, 85 percent of organizations will run containers in production, up from less than 30 percent in 2020.
In recent years, no framework has become more prevalent than MITRE ATT&CK™, the acronym standing for Adversarial Tactics, Techniques, and Common Knowledge. Why? Because it’s one of the most complete, complex and realistic cybersecurity models - and it’s constantly improving.
Azure VMware Solution (AVS) is designed, built, and supported by Microsoft and provides customers with a private cloud of hosted vSphere clusters, cloud certified by VMware. AVS enables customers to seamlessly extend or migrate their VMware workloads to Azure without the cost of re-architecting applications with a set of familiar VMware technologies and tools – including vSphere, vSAN, and NSX-T.
Protection requirements for cloud workloads continue to grow as organizations accelerate their adoption of containers and host an ever-increasing number of workloads in hybrid and multi-cloud architectures. Cloud Workload Protection Platforms (CWPP) are critical to protect these workloads from cyberattack and provide security teams with visibility into, and control of, cloud-based infrastructure and applications.
The potential dangers of ransomware are top of mind for cyber security and IT leaders around the world. The threat of these attacks continues to rise with no organization completely safe. Ransomware attacks have been reported by businesses of all sizes and vertical industries.
During a recent investigation, our researchers encountered a new version of the BADHATCH malware used by the well-known threat actor, FIN8. We previously reported that FIN8 was working on a new version of the BADHATCH malware - and this recent attack supports our findings and conclusions. FIN8 is known for taking extended breaks to improve their tactics, techniques, and procedures (TTPs) which increases their success rate. With each new version of their toolkit, they start with small tests on a limited pool of victims before launching a full-scale attack.
A growing number of organizations are increasing their use of the cloud.
These workloads, including databases, transactions, and analytics, are vital to business operations.
Cloud workloads are different from regular endpoints which is why security teams need to deploy platforms specifically designed to protect these resources.
Augment your email security solution for today’s challenges.
- More attacks aimed at exploiting unpatched year-old vulnerabilities
- An increase in stealth/covert execution tactics
- APT-hackers-for-hire becoming the new norm